0% found this document useful (0 votes)
41 views86 pages

Unit-1-Internet of Things (IoT)

Uploaded by

Seshu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views86 pages

Unit-1-Internet of Things (IoT)

Uploaded by

Seshu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 86

Unit I

Introduction to Internet of
Things
DR. ARVIND R. YADAV
PROFESSOR & ASSOCIATE DEAN
ELECTRONICS & COMMUNICATION
ENGINEERING,
PIET, FET,
PARUL UNIVERSITY
Introduction
Internet of Things (IoT) comprises things that have unique
identities and are connected to the internet.
Existing devices, such as networked computers or 4G enabled
mobile phones already have some form of unique identities and
are also connected to the internet,
The focus on IoT in the configuration, control and networking
via the internet of devices or things, that are traditionally not
associated with the Internet.
These include devices such as thermostats, utility meters, a blue
tooth connected headset, irrigation pumps and sensor or control
circuits for an electric car’s engine.
Experts forecast that by the year 2020 there will be a total of 50
billion devices/ things connected to the internet.
The scope of IoT is not limited to just connected things
(Devices, appliance, machines) to the Internet.
Applications on IoT networks extract and create information
from lower level data by filtering, processing, categorizing,
condensing and contextualizing the data.
The information obtained is then organized and structured to
infer knowledge about the system and or its user, its
environment and its operations and progress towards its
objectives, allowing a smarter performance.
Definition and characteristics of IoT:
Definition:
A dynamic global network infrastructure with self
configuring based on standard and interoperable
communication protocols where physical and virtual
“things” have identified, physical attributes, and virtual
personalities and use intelligent interfaces, often
communicate data associated with users and their
environment
Characteristics
Dynamic and self-Adapting:
IoT devices and systems may have the capability to
dynamically adapt with the changing contexts and take
actions based on their operating condition. Ex: Surveillance
cameras can adapt their modes based on whether it is day or
night.
Self – Configuring:
IoT devices may have self-Configuration capability allowing
a large number of devices to work together to provide certain
functionality .
Interoperable communication protocols: IoT Devices may
support a number of interoperable communication protocols and
can communicate with other devices and also with the
infrastructure.
Unique Identity: Each IoT devices has a unique identity and a
unique identifier (IP address, URI). IoT systems may have
intelligent interfaces which adapt based on the context, allow
communication with users and the environment contexts.
Integrated into information network:
IoT devices are usually integrated into the information network
that allows them to communicate and exchange data with other
devices and systems.
Physical Design of IoT

Things of IoT: The “Things” in IoT usually refers to IoT devices which
have unique identities and can perform remote sensing, Actuating and
monitoring capabilities.
IoT devices can
▪Exchange data with other connected devices and applications (directly or
indirectly), or
▪Collect data from other devices and process the data locally or
▪Send the data to Centralized servers or cloud based applications back
ends for processing the data or
▪Perform some task locally and other task within the IoT infrastructure,
based on temporal and space constraints (ie : Memory, processing
calibrators, communication latencies and speed and deadlines).
Generic block diagram of an IoT Device
An IoT device may consist of several interfaces connections to other
devices, both wired and wireless.
These include
❖IoT interfaces for sensors
❖Interfaces for internet connectivity
❖Memory and storage interfaces
❖Audio video interfaces.
An IoT Device can collect various types of data from the onboard or
attached sensors, such as temperature e , humidity, light intensity.
IoT devices can also be varied types, for instance, wearable sensors, smart
watches, LED light automobiles and industrial machines.
Almost all the generated data in some form or the other when processed by
Data Analytics systems leads to Useful information to guide further actions
locally or remotely.
IoT Protocol
Link Layer Transport Layer
• 802.3 – Ethernet • TCP
• 802.11 – WiFi • UDP
• 802.16 – WiMax
• 802.15.4 – LR-WPAN
• 2G/3G/4G
Network/Internet Layer Application Layer
• IPv4 • HTTP
• IPv6 • CoAP
• 6LoWPAN • WebSocket
• MQTT
• XMPP
• DDS
• AMQP
IoT Protocol

Link Layer:
Link Layer protocols determine how the data is physically
sent over the networks physical layer or medium (example
copper wire, electrical cable, or radio wave).
The Scope of the Link Layer is the Last Local Network
connections to which host is attached. Host on the same link
exchange data packets over the link layer using the link layer
protocol.
Link layer determines how the packets are coded and
signaled by the hardware device over the medium to which
the host is attached.
802.3 Ethernet: 802.3 is a collections of wired Ethernet standards for
the link layer. For example 802.3 10BASE5 Ethernet uses coaxial cable
as a shared medium, 802.3.i is standard for 10 BASET Ethernet over
copper twisted pair connection, Standards provide data rates from 10
Mb/s to 40 gigabits per second and the higher.
The shared medium in Ethernet can be a coaxial cable, twisted pair wire
or and Optical fiber. Shared medium carries the communication for all
the devices on the network.
802.11- WI-FI: IEEE 802.11 is a collections of wireless Local area
network (WLAN) communication standards, including extensive
descriptions of the link layer.
For example 802.11a operate in the 5 GHz band, 802.11b and 802.11g
operate in the 2.4 GHz band. 802.11ac operates in the 5G hertz band.
802.16 wiMAX: IEEE 802.16 is a collection of wireless
broadband and Standards, including extensive descriptions for the
link layer also called WiMAX wimax standard provides a data
rates from 1.5 Mb/s to 1Gb/s the recent update provides data rates
of hundred megabits per second for mobile station.
802.15.4 LR-WPAN: IEEE 802.1 5.4 is a collections of standard
for low rate wireless personal area network (LR-WPAN).These
standard form the basis of specifications for high level
communication Zigbee. LR-WPAN standards provide data rates
from 40 k b/ s. These standards provide low cost and low speed
Communications for power constrained devices.
2G / 3G / 4G mobile communications: These are the different
generations of mobile communication standards including second
generation (2G including GSM and CDMA). 3rd Generation (3G
including UMTS and CDMA2000) and 4th generation 4G including
LTE.
Network / Internet layer

The network layer is responsible for sending of IP datagrams from the


source network to the destination network. This layer Performs the host
addressing and packet routing.
The datagrams contains a source and destination address which are used
to route them from the source to the destination across multiple
networks. Host Identification is done using the hierarchy IP addressing
schemes such as ipv4 or IPv6.
IPV4: Internet protocol versions four (IPV4) is the most deployed
internet protocol that is used to identify the device on a network using a
hierarchy schemes.
It uses 32 bit address scheme that allows total of 232 address. As more
and more devices got connected to the internet, the Ipv4 has succeeded
by IPv6.
IPv6: It is the newest versions of internet protocol and
successor to IPv4. The IPv6 uses 128 bit address schemes
that offers a total of 2128 i.e., 3.4* 1038 addresses.
6LoWPAN: IPv6 over low power wireless personal area
networks brings IP protocol to the low power device which
have limited processing capability. It operates in the 2.4 GHz
frequency range and provide the data transfer rate off to 50
kb/s.
Transport layer

The Transport layer protocols provides end-to-end message transfer capability


independent of the underlying network. The message transfer capability can be
set up on connections, either using handshake or without handshake
acknowledgements. Provides functions such as error control, segmentation, flow
control and congestion control.
TCP: Transmission control protocol is the most widely used to transport layer
protocol that is used by the web browsers along with HTTP, HTTPS application
layer protocols, email program (SMTP application layer protocol) and file
transfer protocol.
TCP is a connection Oriented and stateful protocol, while IP protocol deals with
sending packets, TCP ensures reliable transmissions of packets in order. TCP also
provide error detection capability so that duplicate packets can be discarded and
low packets are retransmitted. The flow control capability ensures that the rate at
which the sender since the data is now to too to high for the receiver to process.
UDP: unlike TCP, which requires carrying out an initial setup procedure,
UDP is a connection less protocol.
UDP is useful for time sensitive application.
They have very small data units to exchange and do not want the
overhead of connection setup.
UDP is a transactions oriented and stateless protocol.
UDP does not provide guaranteed delivery, ordering of messages and
duplicate eliminations.
Application layer :
Application layer protocol define how the application interfaces with the lower
layer protocols to send the data over the network. Data are typically in files, is
encoded by the application layer protocol and encapsulated in the transport layer
protocol. Application layer protocol enable process-to-process connection using
ports.
Http: Hypertext transfer protocol is the application layer protocol that forms the
foundations of world wide web. The http includes, commands such as GET, PUT,
POST, DELETE, HEAD, TRACE, OPTIONS etc.
The protocol follows a request-response model wherein client sends request to
server using the http commands.
Http is a stateless protocol and each http request is independent of other request
and http client can be a browser or an application running on the client.
Example application running on an IoT device, mobile applications or other
software.
CoAP: Constrained application protocol is an application layer
protocol for machine to machine application (M2M) The M2M is
meant for constrained environment with constrained devices and
constrained networks.
Like http, CoAP is a web transfer protocol and uses a request-
response model, however it runs on the top of the UDP, instead of
TCP.
The CoAP uses a client–server architecture where client
communicate with server using connectionless datagrams. It is
designed to easily interface with http. Like http, CoAP supports
method such as GET, PUT, DELETE .
Websocket: Websocket protocol allows full duplex
communication over a single socket connections for sending
message between client and server.
Websocket is based on TCP and allows streams of messages
to be sent back and forth between the client and server while
keeping the TCP connection open.
The client can be a browser, a mobile application and an IoT
device.
MQTT: Message Queuing Telemetry Transport is a
lightweight message protocol based on public-subscribe
model.
MQTT uses a client server architecture by the clients such as
an IoT device connect to the server also called the MQTT
broker and publishers message to topic on the server.
The broker forward the message to the clients subscribed to
topic. The MQTT is well suited for constrained and
environments.
XMPP: Extensible Messaging and Presence Protocol is a
protocol for real-time communication and streaming XML
data between network entities.
XMPP powers wide range of applications including
messaging, presence, data syndication, gaming multiparty
chat and voice /voice calls.
XMPP Allows sending small chunks of XML data from one
network entity to another in real time.
XMPP supports both client to server and server to client
communication path.
DDS: Data distribution service is the date centric
middleware standard for device-to-device and machine to
machine communication.
DDS uses a publish subscribe model where publisher for
example device that generate data create topics to which
subscribers can subscribe.
The publisher is an object responsible for data distributions
and the subscriber is responsible for receiving published
data.
DDS provide quality of service (QoS) control and
configurable reliability.
AMQP: Advanced Message Queuing Protocols is an open
application layer protocol for business messaging.
AMQP supports point to point and publish - subscribe model
routing and queuing.
AMQP broker receive message from publishers, for example
devices or applications that generate data and about them
over connections to consumers.
Publishers publish the message to exchange which then
distribute message copies to queues.
Logical design of IoT

Logical design of an IoT system refers to an abstract


representation of the entities and process without going into low
level specification of the implementations .
IoT functional block: An IoT system comprises of a number of
functional blocks that provide the system the capabilities for
identification, sensing, actuation, communication and
Management. The function blocks are described as follows:
Devices: An IoT system comprises of the devices that provide
sensing, actuation, monitoring and control function
Communication: Communication block handle the
communication systems .
Services: An IoT system uses various types of IoT services such
as services for device monitoring, device control services, data
publishing services and services for device discovery.
Management: Functional blocks provide various functions to
govern the IoT system Security. Security functional block provide
security an IoT system and by providing functions such as
application authorization message and content integrity and data
security.
Application: IoT application provides interface that the user can
use to control and monitor various aspects of the IoT system.
Application also allow users to view the system status and view or
analyze the processed to data.
IoT communication model
Request-Response communication model:
◦ Request-response is a Communications model in which the client sends
request to the server and the server responds to the requests.
◦ When the server receives a request it decides how to respond, it shows the
data retrieved resources definitions for the response, and then send the
response to the client.
◦ Access to response model is a stateless communication model and each
request response is independent of others the crime and server interactions in
the request response model.
Publish-Subscribe communication model: It is a communication
model that involve Publishers, brokers and consumers.
◦ Publishers are the source of data. Publishers send the data to the topics which
is managed by the broker.
◦ Publishers are not aware of the consumer.
◦ Consumers Subscribe to the topic which are managed by the broker.
◦ When the broker receives the data for a topic from the publisher, it send the
data to all the subscribed consumers.
Push-Pull communication model:
◦ Push pull is communication model in which the data producers push the data
to queues and the consumers pull the data from the queues.
◦ Producers do not need to be aware of the consumer.
◦ Queues help in decoupling the messaging between the Producers and
Consumers.
◦ It also act as a buffer which helps in situations when there is a mismatch
between the rate at which the producers push data and the rate at which the
consumers pull the data
Exclusive Pair communication
model:
◦ Exclusive pair is a bi-directional, fully
duplex communication model that
uses a persistent connections between
the client and the server.
◦ Once the connection is setup it
remains open until the client sends a
request to close the connection.
◦ Client and server can send messages
to each other after connection setup.
◦ Exclusive pair is a stateful
Communications model and the server
is aware of all the open connections.
IoT communication APIs

REST-based Communication APIs:


◦ Representational State Transfer (REST) is a set of architectural
principles by which you can design web services and web APIs
that focus on a system’s resources and how resource states are
addressed and transferred.
◦ REST APIs follow the request-response communication model.
◦ The REST architectural constraints apply to the components,
connectors, and data elements, within a distributed hypermedia
system.
Client server: The principle behind the client-server separations, for
example client should not be concerned with the storage of data which is
the concern of the server. Similarly the server should not be concerned
about the user interface which is a concern of the client. Separation
allows client and server to be independently deployed and updated.
Stateless: Each request from client to server must contain all the
information necessary to understand the request, and cannot take
advantage of any stored context on the server.
Catchable: Catch constraint requires that the data within the response to
a request be implicitly or explicitly labeled as catchable or non-
catchable. Then a client cache is given the right to reuse that response
data for later, equivalent requests. Completely eliminate some attractions
and improve efficiency and scalability.
Layered system: System constraint some of constraints are, constraint the
behavior of components such that each component cannot see beyond the
immediate layer with which they are interacting.
Example, client cannot tell whether it is connected directly to the end server
or to an intermediary along the way. System scalability can be improved
allowing intermediaries to respond to request instead of the end server.
Uniform interface: Uniform interface constraints requires that the method
of communication between client and server must be uniform. Resources are
identified in the request and separate from the representation of the resource
that are returned to the client. When climbing holds a representation of your
resource it has all the information required to update or delete the resource.
Code on demand: Service can provide executable code script for clients to
execute in their context.
WebSocket-based Communication APIs

◦ WebSocket APIs allow bidirectional, full duplex communication between


clients and servers.
◦ WebSocket APIs follow the exclusive pair communication model
WebSocket communication begins with connection setup request send by
the client to the server.
The request is sent over http and the server interprets it as an upgrade
request.
If the server support protocol response to the website handshake
response after the connection setup, the client and the server can send
data or messages to each other in full duplex mode.
WebSocket API reduces network traffic and latency as there is no
overhead for connection setup and determination records to each
message.
IoT enabling Technologies
It is enabled by several Technologies including
❖Wireless sensor networks,
❖Cloud computing,
❖Big Data Analytics,
❖Embedded system,
❖Security protocols and architectures,
❖Communication protocols,
❖Web service,
❖Mobile internet and
❖Semantic search engine.
Wireless sensor network

• Wireless sensor network (WSN) comprise of distributed


devices with the sensor which are used to monitor the
environmental and physical conditions.
• A WSN consists of a number of end nodes and routers and a
coordinator. End nodes have several sensors attached to them.
• End node can also act as a routers. Routers are responsible for
routing the data packet from end nodes to the coordinator.
• The coordinator node collect the data from all the nodes
coordinator also act as a Gateway that connects the WSN to the
internet.
IoT systems are described as follows:
• Weather monitoring system using WSN in which the nodes collect
temperature, humidity and other data which is aggregated and
analyzed .
• Indoor air quality monitoring system using WSN to collect data on the
indoor air quality and connections of various gases.
• Soil moisture monitoring system using WSN to monitor soil moisture
at various location.
• Surveillance systems use WSN for collecting surveillance data
(motion detection data).
• Smart grid use wireless sensor network for monitoring the grid at
various point.
• Structural health monitoring systems use WSN to monitor the health
of structure by writing vibration data from sensor nodes deployed at
various points in the structure.
Cloud computing:

Cloud Computing is a transformative computing paradigm that involves


delivering applications and services over the internet.
◦ Cloud Computing involves provisioning of computing, networking and
storage resources on demand and providing these resources as metered
services to the users, in a “ pay as you go” model.
◦ Cloud Computing resources can be provisioned on demand by the user
without requiring interactions with the Cloud Service Provider.
◦ The process of provisioning resources use automatic Cloud Computing
resources can be accessed then it worked using standard access mechanism
that provide platform-independent access through the use of heterogeneous
client platforms such as workstations, laptops, tablets and Smartphones.
◦ The computing and storage resources provided by Cloud Service Provider
serve multiple user using multi Tenancy.
◦ Multi-tenant aspects on the multiple users to be served by the same physical
hardware .
Cloud Computing services are offered to user in different forms
Infrastructure as a service(IAAS): IaaS provides the user the ability provision
computing and storage resources. These resources are provided to the users as
virtual machine instances and virtual storage. Users can start, stop, configure and
manage the virtual machines instance on the virtual storage. They can deploy
operating systems and applications of their choice on the actual resources
provisions in the cloud. Cloud Service Provider manages the underlying
infrastructure.
Platform as a service(PaaS): Platform as a service provides the user the ability
to develop and deploy application in the cloud using the deployment tool
application programming interfaces API, software libraries and services provided
by the Cloud Service Provider. The Cloud Service Provider manages the
underlying cloud infrastructure including servers, network, operating systems
and storage .
Software as a service(SaaS): Provide the user a complete software
applications of the user interface to the application itself.
The Cloud Service Provider manage the underlying cloud infrastructure
including server, network storage and application software, and the user
is unaware of the underlying architecture of the cloud.
Applications are provided to the user through a thin client interface
example Browser application. SaaS applications are accessed from
various client smartphones running different operating system.
Big Data Analytics
Big data is defined as collections of data set whose volume, velocity in terms of
its temporal variations or variety, is so large that it is difficult to store, manage,
process and analyze the data using traditional database and data processing tools.
Big Data Analytics involves several steps starting from Data cleaning, data
augmentation, data processing and visualization.
Some examples of big data generated by IoT systems are described as follows:
1. Sensor data generated by IoT system such as weather monitoring stations
2. Machine sensor data collected from sensor embedded in Industrial and
energy system for monitoring their files and protecting failure
3. Health and fitness data generated by IoT devices such as wearable fitness
band.
4. Data generated by IoT system for Location tracking of vehicle.
5. Data generated by retail inventory monitoring system.
Characteristics of data include:

Volume: Though there is no fixed threshold for volume of data to be considered


as big data, however the term big data is used for massive scale data that is
difficult to store, manage and process using traditional data bases and data
processing architecture.
The volume of data generated by modern IT, industrial and Healthcare systems
for example is a growing exponentially driven by the lowering cost of data
storage and processing architectures and the need to extract valuable insights
from the data to improve business processes, efficiency and services to
consumer.
Velocity: Velocity is another important characteristics of big data and the
primary reasons for exponential growth of velocity of the data is how fast the
data is generated and how frequently it varies. Modern IT Industry and other
systems are generating data at increasing speeds.
Variety: Variety refers to the forms of the data. Big data comes in for different
forms such as structured or unstructured data including text data, audio, video
and sensor data .
Communications protocol:
Communications protocols form the backbone of IoT system and enable
network connectivity and coupling to applications.
Communication protocols allow device to exchange data over the
network.
These protocols define the data exchange formats and data encoding
schemes for devices and routing of packets from source to destination.
Other function of the protocol include sequence control flow control and
transmissions of Lost packet.
Embedded systems
An Embedded system is a computer system that has computer hardware
and software embedded to perform specific task.
In contrast to general purpose computers or personal computers, which
can perform various types of tasks, embedded systems are designed to
perform a specific set of tasks.
Embedded system include Microprocessor and Microcontroller, memory,
RAM, ROM, cache, networking units (Ethernet WI-FI adaptor)
input/output unit, display, keyboard, and storage such as Flash Memory.
Some embedded system have specialist processes such as digital signal
processo (DSP) graphic processor and application.
IoT Levels & Deployment Templates

An IoT system comprises of the following components:


Device: An IoT device allows identification, remote sensing, actuating
and remote monitoring capabilities.
Resource: Resources are software components on the IoT device for
accessing, processing, and storing sensor information, or controlling
actuators connected to the device. Resources also include the software
components that enable network access for the device.
Controller Service: Controller service is a native service that runs on
the device and interacts with the web services. Controller service sends
data from the device to the web service and receives commands from the
application (via web services) for controlling the device.
Database: Database can be either local or in the cloud and stores the
data generated by the IoT device.
Web Service: Web services serve as a link between the IoT device,
application, database and analysis components. Web service can be either
implemented using HTTP and REST principles (REST service) or using
WebSocket protocol (WebSocket service).
Analysis Component: The Analysis component is responsible for
analyzing the IoT data and generate results in a form which are easy for
the user to understand.
Application: IoT applications provide an interface that the users can use
to control and monitor various aspects of the IoT system. Applications
also allow users to view the system status and view the processed data.
A comparison of restaurant website is
provided below:

Stateless/stateful: Rest services are stateless in nature.


Each request contain all the information needed to process it. Request are
independent of each other.
Website on the other hand is stateful in nature where the server maintains
the state and is aware of all the open connections.
Directional / Bi- directional: REST service operate over http and
unidirectional.
Request is always sent by a client and the server response to the request.
And other hand website is a bi directional product server to send
message to each other.
Request response / full duplex: REST service follows request response
Communications model where the client sends request and the server response to
the request. Website on the other hand allow full-duplex Communications
between the client and server, it means both client and server can send messages
to each other independently.
TCP connections: For REST Service each http request involves setting up a new
TCP connections. Websocket on the other hand involves a single TCP connection
over which the client and server communicate in a full duplex mode.
Headache Overhead: REST service operate over http, and each request is
independent of others. Thus each request carries http header which is an
overhead. Due to the overhead of http headers, REST is not suitable for real time
applications. After the initial handshake the client and server exchange messages
with minimal frame information.
Scalability: Scalability is easier in this case of the REST services as requests are
independent. Further, no state information needs to be maintained by the server.
Thus both horizontal out and vertical scaling solutions are possible for REST
services.
For webSockets horizontal scaling can be cumbersome due to stateful nature of
the communication. Since the server maintains the state of all connections,
vertical scaling is easier for Websocket than horizontal scaling.
Analysis component: The analysis component is responsible for analyzing the
IoT data and generate results in the form which are easy for the user to
understand. Analysis of IoT data can be performed either locally or in the cloud.
Analyzed results are stored in the local or cloud database.
Application: IoT applications provide an interface that the user can use to
control and monitor various aspects of the IoT system. Applications also allow
user to view the system status and view the processed data.
IoT Level-1
A level-1 IoT system has a
single node/device that
performs sensing and/or
actuation, stores data,
performs analysis and hosts
the application
Level-1 IoT systems are
suitable for modeling low
cost and low–complexity
solutions where the data
involved is not big and the
analysis requirements are
not computationally
intensive.
IoT Level-2
A level-2 IoT system has a single
node that performs sensing and/or
actuation and local analysis.
Data is stored in the cloud and
application is usually cloud based.
Level-2 IoT systems are suitable for
solutions where the data involved is
big, however, the primary analysis
requirement is not computationally
intensive and can be done locally
itself.
IoT Level-3
A level-3 IoT system has a single
node. Data is stored and analyzed
in the cloud and application is
cloud based.
Level-3 IoT systems are suitable
for solutions where the data
involved is big and the analysis
requirements are computationally
intensive.
IoT Level-4
A level-4 IoT system has
multiple nodes that perform local
analysis. Data is stored in the
cloud and application is cloud-
based.
Level-4 contains local and cloud
based observer nodes which can
subscribe to and receive
information collected in the
cloud from IoT devices.
Level-4 IoT systems are suitable
for solutions where multiple
nodes are required, the data
involved is big and the analysis
requirements are
computationally intensive.
IoT Level-5
A level-5 IoT system has multiple end
nodes and one coordinator node.
The end nodes that perform sensing
and/or actuation.
Coordinator node collects data from
the end nodes and sends to the cloud.
Data is stored and analyzed in the
cloud and application is cloud-based.
Level-5 IoT systems are suitable for
solutions based on wireless sensor
networks, in which the data involved
is big and the analysis requirements
are computationally intensive.
IoT Level-6
A level-6 IoT system has multiple
independent end nodes that perform
sensing and/or actuation and send
data to the cloud.
Data is stored in the cloud and
application is cloud-based.
The analytics component analyzes
the data and stores the results in the
cloud database. The results are
visualized with the cloud-based
application.
The centralized controller is aware of
the status of all the end nodes and
sends control commands to the
nodes.
IoT Applications : Intelligent
Home
https://blog.dreamztech.com/i
ot-applications-agriculture/
Security & Privacy
Are they important?
What is the risk?
What are the challenges?
◦ Device level
◦ Network level
◦ System level
◦ User level
Solutions?
Challenges of IoT
➢Connectivity
➢Power Management
➢Security
➢Rapid Evolution
Reference Books
Internet of things a hands on approach by Arshdeep Bahga
and Vijay Madisetti
From Machine-to-Machine to the Internet of Things
Introduction to a new age of Intelligence by Jan Ho¨ller,
Vlasios Tsiatsis, Catherine Mulligan, Stamatis Karnouskos,
Stefan Aves, and David Boyle

You might also like